Edufocus.co.ke

Edufocus Kenya

Form 4 KCSE 2026 Computer Studies Paper 1 Prediction

Published on March 10th 2026 | 13 mins , 2521 words

1. Explain the term procedural language as used in computer programming.                      (2mks)

A procedural language is a type of programming language that follows a step-by-step approach in executing instructions. 

·It is based on procedures or functions, which are blocks of code that perform specific tasks. 

2. A company allows employees to telework work at home and communicate with the office using internet.

(i) State three ways that a report could be sent to the office using the internet.      (3mks)

  • Email attachment
  • Cloud storage (e.g., Google Drive, Dropbox)
  • Instant messaging (e.g., WhatsApp, Slack, Microsoft Teams)
  • Video conferencing screen sharing
  • File Transfer Protocol (FTP)
  • Online collaboration tools (e.g., Google Docs, Microsoft OneDrive)

(ii) Give two benefits to the company of using video conferencing.                                     (2mks)

  • Reduces travel costs
  • Improves real-time collaboration
  • Enhances communication efficiency
  • Allows remote work flexibility

3. List two types of job opportunities that are available in the field of computer software. (2mks)

  • Software developer
  • System analyst
  • Database administrator
  • Network engineer

4. Describe three ways of deleting a line of text in Microsoft word document.                  (3mks)

  • Use Shift + End, then press Delete.
  • Select the line using a mouse and press Delete or Backspace.
  • Place the cursor at the beginning of the line and press Backspace continuously.

5. Explain the holistic thinking with respect of system development.    (2mks)

  • Holistic thinking considers the entire system as a whole rather than focusing on individual parts. 
  • It ensures all components, including users, processes, hardware, and software, work efficiently together. 

 

 6.  Give three features of good algorithm.        (3mks)

  • Finiteness – The algorithm must terminate after a finite number of steps.
  • Definiteness – Each step should be precisely defined.
  • Effectiveness – It should be simple and practical.
  • Input/Output – It must have input values and produce output.

7. List three human features used in biometric systems installed in a computer to authenticate users.    (3mks)

  • Fingerprint
  • Retina/Iris scan
  • Facial recognition
  • Voice recognition

8. Mention three ways in which human beings issue commands to computer.  (3mks)

  • Keyboard input
  • Mouse clicks
  • Touchscreen gestures
  • Voice commands
  • Joystick or game controllers

9. Give four file management tasks that would be carried out by an operating system.   (4mks)

  • Creating files
  • Deleting files
  • Renaming files
  • Copying files
  • Organizing files into folders
  • Managing file permissions

10. What is input validation with regard to spreadsheet application.                                     (2mks)

  • It is the process of ensuring that only valid and meaningful data is entered into a spreadsheet.
  • It involves setting constraints such as numerical limits, text formats, or required fields. 

11.  Explain three health challenges that workers may experience as a result of using ICT gadgets in an organization.       (3mks)

  • Eye strain
  • Repetitive strain injury (RSI)
  • Back pain
  • Stress from prolonged screen exposure
  • Hearing damage from loud audio devices

 

12.  Identify two circumstances under which a system analyst may prefer to use automated methods to collect data instead of questionnaire, observation, interviews and book review.   (2mks)

 

  • When handling large data volumes
  • When real-time data collection is required
  • When high accuracy is needed
  • When working in hazardous environments

 

13.  Explain the following measures against unauthorized access:     (2mks)

(a) Security Policy – A set of rules defining how an organization protects IT infrastructure.
(b)
Security Monitor – A system that continuously checks for security breaches.

14.  Briefly explain two types of logical topologies.                     (2mks)

Ethernet Network (Logical Bus, Physical Star)

o   Physically, all devices are connected to a switch (star topology).

o   Logically, data flows like a bus network (Ethernet broadcasts packets).

Token Ring (Logical Ring, Physical Star)

o   Devices are physically connected in a star shape.

o   Data travels in a ring-like pattern using a token.

15.  What does gutter mean in relation to column setting in DTP.    (2mks)

  • The gutter is the extra space between columns to improve readability or allow for binding in printed materials.

SECTION B

16.  a) State the three basic types of program control structures.    (3mks)

Sequence – Instructions are executed one after another in the order they appear.

Selection (Decision-Making) – The program makes a choice based on a condition (e.g., IF-ELSE statements). Iteration (Looping) – A set of instructions is repeated until a condition is met (e.g., WHILE, FOR loops).

b) Define the following terms:

 i) Hardware oriented   (2mks)

Refers to software or programming languages that are designed to work closely with hardware components.

Example: Assembly language directly interacts with a computer’s CPU and memory.

ii) Translator    (2mks)

A program that converts code from one programming language into another, typically from high-level to machine code.

Types include compilers, interpreters, and assemblers.

iii) Syntax error   (2mks)

  • An error that occurs when the program does not follow the grammatical rules of a programming language.
  • Example: Missing a semicolon (;) in C programming.

c) Study the following flowchart diagram.                                                                      

 


 

i) Indicate the purpose of the above flowchart.  (1mk)

The flowchart is used to determine the highest and the lowest between A and B.

ii) Design a pseudocode for the flowchart above.(5mks)

BEGIN

    PRINT "Enter the first number:"

    INPUT num1

    PRINT "Enter the second number:"

    INPUT num2

     IF num1 > num2 THEN

        PRINT "The largest number is: ", num1

    ELSE IF num2 > num1 THEN

        PRINT "The largest number is: ", num2

    ELSE

        PRINT "Both numbers are equal."

    ENDIF

END. 

Explanation:

  1. The program prompts the user to input two numbers.
  2. It compares the two numbers using conditional statements (IF-ELSE).
  3. It prints the larger number or states that both are equal.

17.  a) Study the table below and answer the questions that follow.

 |   |   |   |   |   |   |   |
 |   | A | B | C | D | E | F | G
| 1 | Product ID | Product Name | Received Quantity | Sold Quantity | Balance Stock | Unit Price | Total
| 2 | KW00012 | KDF | 1000 | 300 | 700 | 60 |  
 | 3 | KW00023 | Juice Kola | 200 | 150 | 50 | 50 |  
 | 4 | KW00045 | Gaddafi | 130 | 130 | 0 | 10 |  
 | 5 | KW00029 | Bread | 400 | 200 | 200 | 50 |  
 | 6 | Trade Discount  | 10% |   |   |   |   |  
 | 7 | VAT | 16% |   |   |   |   |  

(i)  Write down the formula that

Calculate the balance stock   (2mks)

  • =C2 - D2

Calculate the total cost                                                                                                                 (2mks)

  • =E2 * F2

(ii) Given that customers who purchased Juice Kola were allowed 10% trade discount write a formula that would be used to get the total cost.  (2mks)

 

  • = (F3 * D3) * (1 - 10%)

(iii) Value added Tax of 16% was imposed on Gaddafi write a formula for the new price.   (2mks)

 

  • =F4 * (1 + 16%)

b) Describe three hardware related factors that one need to consider before installing an operating system.   (3mks)

Processor Speed – The CPU must meet the minimum requirements for the OS.

RAM Capacity – Sufficient memory is needed for smooth operation.

Storage Space – The hard drive or SSD must have enough free space for installation.

Graphics Capability – A compatible graphics card may be required for certain OS features.

Peripheral Compatibility – The OS should support existing printers, scanners, and other devices.

 

 

 

 

c) List three things that may cause malfunction in Microsoft Window Operating system environment (3mks)

 Malware and Viruses – Can corrupt system files and slow down performance.

Corrupt System Files – Improper shutdowns or failed updates can lead to errors.

Hardware Failure – Faulty RAM, hard drives, or overheating can cause crashes.

Software Conflicts – Incompatible or poorly coded applications may lead to instability.

Driver Issues – Outdated or incompatible device drivers can cause system errors.

18.a) List two types of domain names given to institutions of learning.                                            (2mks)

·         .edu – Used by educational institutions worldwide.

·         .ac (e.g., .ac.ke, .ac.uk, .ac.in) – Used by academic institutions in specific countries.

b) Explain the function of each button on the navigation toolbar of a web browser.  (3mks)

(i) History – Displays a list of previously visited web pages.
(ii)
Home – Navigates to the predefined homepage of the browser.
(iii)
Download – Opens the download manager to show downloaded files.

c) Peter Kenneth bought a PC for his personal use at home. He wanted to do online writing at home to earn a living but there was no internet connectivity at home. Mention three internet connectivity requirements Peter Kenneth need to consider to get full internet connectivity.                           (3mks)

Internet Service Provider (ISP) subscription – To access internet services.

Networking hardware (e.g., router, modem, or mobile hotspot) – To establish internet connectivity.

Data plan or broadband connection – To provide internet access for online work.

d) Give three reasons to justify why companies like Alibaba, Kilimali, Jumia, Copia and Masoko prefer selling their products on e-commerce platform  (3mks)

  • Wider customer reach – Access to a global market.
  • Reduced operational costs – No need for physical stores.
  • 24/7 availability – Customers can shop anytime.
  • Data-driven marketing – AI and analytics help personalize offers.
  • Secure and convenient transactions – Online payment systems simplify purchases.

e) Describe two factors to consider when choosing a file organization method.                       (2mks)

  • Speed of data access – How quickly data needs to be retrieved.
  • Storage efficiency – Optimal use of storage space.
  • Ease of updating records – Adding, modifying, and deleting records should be simple.
  • Data integrity and security – Protection against loss and unauthorized access.
  • Nature of application – Some methods suit specific data processing needs.

     

 

 

 

f) State two challenges facing electronic data processing modes in the current society.         (2mks)

  • Cybersecurity threats – Risk of hacking and data breaches.
  • High initial cost – Expensive infrastructure and software.
  • Data loss risks – System failures and accidental deletions.
  • Technical expertise requirement – Skilled personnel needed for maintenance.
  • Privacy concerns – Unauthorized access to personal data.

19. a) Enumerate four break-through in health care investigated by ICT                                          (4mks)

  • Telemedicine – Remote diagnosis and treatment through video calls and mobile apps.
  • Electronic Health Records (EHRs) – Digital storage and retrieval of patient medical records.
  • Robotic Surgery – Precision surgeries performed with robotic assistance.
  • AI-powered Diagnostics – Machine learning algorithms assisting in disease detection and treatment planning.

      b) Name four application areas of artificial Intelligence.                                                              (4mks)

  • Healthcare (e.g., AI diagnostics, drug discovery)
  • Finance (e.g., fraud detection, stock market analysis)
  • Autonomous vehicles (e.g., self-driving cars)
  • Customer service (e.g., chatbots, virtual assistants)
  • Cybersecurity (e.g., threat detection)
  • Manufacturing (e.g., predictive maintenance, quality control)

 c) List three scanning devices available at electronic Point Sale Terminal.                                  (3mks)

  • Barcode scanner
  • QR code scanner
  • Magnetic stripe reader
  • RFID (Radio Frequency Identification) scanner

  d) Describe two ways of avoiding eavesdropping. .   (2mks)

Using encryption – Encrypting communication to prevent unauthorized access.

·         Using VPNs – Secure tunneling to hide internet traffic.

·         Avoiding public Wi-Fi – Preventing exposure to unsecured networks.

·         Using strong authentication methods – Implementing multi-factor authentication

      e)   System failure is considered as a threat to data security. Describe three measures an organization should put in place to guard against system failure.                                                                     (3mks)

  • Regular data backups – Ensuring critical data is stored safely.
  • Using Uninterruptible Power Supply (UPS) – Protecting against power failures.
  • Updating and patching software – Preventing vulnerabilities and security risks.
  • Implementing redundancy – Having backup systems in case of hardware failure.
  • Monitoring system performance – Identifying and addressing issues before failure occurs.



 

20.a) List two types of fields in a database use to create relationship between multiple tables.        (2mks)

  • Primary Key – A unique identifier in a table.
  • Foreign Key – A field in one table that refers to the primary key of another table.

      b) Describe three types of relationships used in a database to link multiple tables.                    (3mks)

  • One-to-One (1:1) – Each record in Table A is related to only one record in Table B.
  • One-to-Many (1:M) – One record in Table A can be linked to multiple records in Table B, but a record in Table B relates to only one in Table A.
  • Many-to-Many (M:M) – Records in Table A can be related to multiple records in Table B and vice versa.

      c) Describe the following field data types as used in Databases

i) Calculated Field (2mks)

·         A field that derives its value from an expression or formula rather than being manually entered.

·         Example: A field calculating Total_Price as Quantity * Unit_Price.

ii) Attachment Field (2mks)

·         A field used to store files such as images, documents, or PDFs within a database.

·         Example: Attaching a scanned copy of an ID to a customer record.

          d) Name two power related problems usually affects the running of a computer in a lab.      (2mks)

  • Power surges – Sudden increases in voltage that can damage components.
  • Blackouts – Total power loss that causes unsaved work to be lost.
  • Brownouts – Low voltage levels that may cause instability in devices.
  • Electromagnetic interference (EMI) – Disruptions caused by electrical noise affecting performance.

e) i) What is a toggle key?     (1mk)

  • A key that switches between two states, such as ON and OFF, when pressed.

 ii) Give three examples of toggle keys.  (3mks)

  • Caps Lock
  • Num Lock
  • Scroll Lock
  • Insert
Download File